skip to main content
10.1145/3377049.3377126acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaConference Proceedingsconference-collections
research-article

Criminal Behavior Analysis for Questionable Vehicle Detection

Authors Info & Claims
Published:20 March 2020Publication History

ABSTRACT

Crimes using various types of vehicles are increasing day by day. Crime rates in borders are remarkably high such as smuggling drugs, people, animals along with many other things. So, it is very essential to make our borders and roads safer. In this paper, we suggest a system to analyze criminal behavior for questionable vehicle detection using automobile license plate recognition (ALPR) system with face recognition system on moving vehicles and matching with blacklisted people. By finding out people's identities we can verify much easily if the people in any vehicle are involved with any types of crimes. But, in developing countries, it is very hard to build smart questionable vehicle detection system with very little ground work. There are also less data to work with. The result of this study shows that, the ALPR system with face recognition system on moving vehicles will improve the efficiency of questionable vehicle detection system.

References

  1. A. Altman and M. Tennenholtz. 2005. Ranking Systems: The Pagerank Axioms. Proceedings of the 6th ACM Conference on Electronic Commerce (2005), 1--8. https://doi.org/10.1145/1064009.1064010Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Z. Chen, N. Pears, M. Freeman, and J. Austin. 2014. A gaussian mixturemodel and support vector machine approach to vehicle type and colour classification. IET Intelligent Transport Systems 8, 2 (2014), 135--144.Google ScholarGoogle ScholarCross RefCross Ref
  3. Changxing Ding, Chang Xu, and Dacheng Tao. 2015. Multi-Task Pose-Invariant Face Recognition. IEEE transactions on image processing: a publication of the IEEE Signal Processing Society (2015). https://doi.org/10.1109/TIP.2015.2390959Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Q. Ding, X. Li, M. Jiang, and X. Zhou. 2010. Reputation Management in Vehicular Ad Hoc Networks. Multimedia Technology (ICMT) (Oct. 2010), 1--5.Google ScholarGoogle Scholar
  5. P. L. Hsieh, Y. M. Liang, and H. Y. M. Liao. 2010. Recognition of blurred license plate images. 2010 IEEE International Workshop on Information Forensics and Security (Dec. 2010), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  6. C. Hu, X. Bai, L. Qi, X. Wang, G. Xue, and L. Mei. 2015. Learning Discriminative Pattern for Real-Time Car Brand Recognition. IEEE Transactions on Intelligent Transportation Systems 16, 6 (Dec. 2015), 3170--3181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. H. S. Lai and N. H. C. Yung. 2000. Vehicle-Type Identification Through Automated Virtual Loop Assignment and Block-Based Direction-Biased Motion Estimation. IEEE Transactions on Intelligent Transportation Systems (June 2000).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Lazzari, M. Mari, and A. Poggi. 2005. A collaborative and multi-agent system for E-mail filtering and classification. Collaborative Computing: Networking, Applications and Worksharing (2005), 8.Google ScholarGoogle Scholar
  9. Zhifeng Li, Dihong Gong, Xiaonan Li, and Dacheng Tao. 2015. Learning Compact Feature Descriptor and Adaptive Matching Framework for Face Recognition. IEEE transactions on image processing: a publication of the IEEE Signal Processing Society (2015). https://doi.org/10.1109/TIP.2015.2426413Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Page, S. Brin, R. Motwani, and T. Winograd. 1998. The Pagerank Citation Ranking: Bringing Order to the Web. Proceedings of the 7th International World Wide Web Conference (1998), 161--172. citeseer.nj.nec.com/page98pagerank.htmlGoogle ScholarGoogle Scholar
  11. S. Park, B. Aslam, and C. Zou. 2011. Long-term reputation system for vehicular networking based on vehicle's daily commute routine. Consumer Communications and Networking Conference (CCNC) (Jan. 2011).Google ScholarGoogle Scholar
  12. P. Resnick and R. Zeckhauser. 2002. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System. The Economics of the Internet and E-Commerce 11 (2002), 127--157.Google ScholarGoogle ScholarCross RefCross Ref
  13. B. Taylor. 2006. Sender Reputation in a Large Webmail Service. CEAS (2006).Google ScholarGoogle Scholar
  14. U. Thongsatapornwatana and C. Chuenmanus. 2015. Suspect Vehicle Detection Using Vehicle Reputation with Association Analysis Concept. Image Processing (ICIP) (2015).Google ScholarGoogle Scholar
  15. U. Thongsatapornwatana, W. Lilakiatsakun, A. Kawbunjun, and T. Boongoen. 2017. Analysis of Criminal Behaviors for Suspect Vehicle Detection. The Twelfth International Conference on Digital Information Management (ICDIM 2017) (2017).Google ScholarGoogle Scholar
  16. Jing Wang, Qiwen Zha, Yubo Yang, Yang Liu, Bo Yang, Dengbiao Tu, and Guangda Su. 2015. Facial Stereo Processing by Pyramidal Block Matching. (08 2015), 252--260. https://doi.org/10.1007/978-3-319-21963-9_23Google ScholarGoogle ScholarCross RefCross Ref
  17. Niv Zehngut, Felix Juefei-Xu, Rishabh Bardia, Dipan Pal, Chandrasekhar Bhagavatula, and Marios Savvides. 2015. Investigating the feasibility of image-based nose biometrics. (09 2015), 522--526. https://doi.org/10.1109/ICIP.2015.7350853Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Zhuofeng Zhao, Weilong Ding, Jianwu Wang, and Yanbo Han. 2015. A Hybrid Processing System for Large-Scale Traffic Sensor Data. IEEE Access 3 (2015).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Criminal Behavior Analysis for Questionable Vehicle Detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCA 2020: Proceedings of the International Conference on Computing Advancements
      January 2020
      517 pages
      ISBN:9781450377782
      DOI:10.1145/3377049

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 March 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader